{"id":27394,"date":"2013-07-16T22:00:00","date_gmt":"2013-07-16T22:00:00","guid":{"rendered":"https:\/\/\/white_papers\/principes-fondamentaux-dun-systeme-dauthentification-maitre-esclave-sha-256\/"},"modified":"2022-01-26T15:21:50","modified_gmt":"2022-01-26T15:21:50","slug":"principes-fondamentaux-dun-systeme-dauthentification-maitre-esclave-sha-256","status":"publish","type":"white_papers","link":"https:\/\/www.ecinews.fr\/fr\/white_papers\/principes-fondamentaux-dun-systeme-dauthentification-maitre-esclave-sha-256\/","title":{"rendered":"Principes fondamentaux d&rsquo;un syst\u00e8me d&rsquo;authentification  ma\u00eetre\/esclave SHA-256"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>Depuis plus de 10 ans, l&rsquo;authentification SHA-1 sert \u00e0 prot\u00e9ger efficacement la propri\u00e9t\u00e9 intellectuelle contre la contrefa\u00e7on et la copie ill\u00e9gale. Alors que la puissance de calcul progresse, les utilisateurs demandent un niveau de la s\u00e9curit\u00e9 encore plus \u00e9lev\u00e9. Aujourd&rsquo;hui un nouveau groupe d&rsquo;authentificateurs s\u00e9curis\u00e9s associ\u00e9s \u00e0 un coprocesseur compagnon s\u00e9curis\u00e9, permettent\u00a0 de d\u00e9ployer une authentification SHA-256. Ce nouveau syst\u00e8me fournit une s\u00e9curit\u00e9 physique sup\u00e9rieure, qui permet d&rsquo;assurer une protection d&rsquo;IP in\u00e9gal\u00e9e \u00e0 bas co\u00fbt, emp\u00eache le clonage, et permet l&rsquo;authentification de p\u00e9riph\u00e9rique. Cet article explique l&rsquo;architecture g\u00e9n\u00e9rale des syst\u00e8mes de s\u00e9curit\u00e9 SHA-256 et introduit la fonctionnalit\u00e9 d&rsquo;authentification bidirectionnelle que le syst\u00e8me d&rsquo;authentification utilise.<\/p>\n","protected":false},"featured_media":27396,"template":"","tags":[],"company":[],"wp_category":[],"ppma_author":[1149],"class_list":["post-27394","white_papers","type-white_papers","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<title>Principes fondamentaux d&#039;un syst\u00e8me d&#039;authentification ma\u00eetre...<\/title>\n<meta name=\"description\" content=\"Depuis plus de 10 ans, l&#039;authentification SHA-1 sert \u00e0 prot\u00e9ger efficacement la propri\u00e9t\u00e9 intellectuelle contre la contrefa\u00e7on et la copie ill\u00e9gale....\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/white_papers\/27394\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Principes fondamentaux d&#039;un syst\u00e8me d&#039;authentification ma\u00eetre\/esclave SHA-256\" \/>\n<meta property=\"og:description\" content=\"Depuis plus de 10 ans, l&#039;authentification SHA-1 sert \u00e0 prot\u00e9ger efficacement la propri\u00e9t\u00e9 intellectuelle contre la contrefa\u00e7on et la copie ill\u00e9gale. Alors que la puissance de calcul progresse, les utilisateurs demandent un niveau de la s\u00e9curit\u00e9 encore plus \u00e9lev\u00e9. Aujourd&#039;hui un nouveau groupe d&#039;authentificateurs s\u00e9curis\u00e9s associ\u00e9s \u00e0 un coprocesseur compagnon s\u00e9curis\u00e9, permettent\u00a0 de d\u00e9ployer une authentification SHA-256. Ce nouveau syst\u00e8me fournit une s\u00e9curit\u00e9 physique sup\u00e9rieure, qui permet d&#039;assurer une protection d&#039;IP in\u00e9gal\u00e9e \u00e0 bas co\u00fbt, emp\u00eache le clonage, et permet l&#039;authentification de p\u00e9riph\u00e9rique. Cet article explique l&#039;architecture g\u00e9n\u00e9rale des syst\u00e8mes de s\u00e9curit\u00e9 SHA-256 et introduit la fonctionnalit\u00e9 d&#039;authentification bidirectionnelle que le syst\u00e8me d&#039;authentification utilise.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/white_papers\/27394\/\" \/>\n<meta property=\"og:site_name\" content=\"EENewsEurope\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-26T15:21:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/import\/default\/files\/import\/eci3827_maxim-applic-.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1046\" \/>\n\t<meta property=\"og:image:height\" content=\"802\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/white_papers\/principes-fondamentaux-dun-systeme-dauthentification-maitre-esclave-sha-256\/\",\"url\":\"https:\/\/www.ecinews.fr\/fr\/white_papers\/principes-fondamentaux-dun-systeme-dauthentification-maitre-esclave-sha-256\/\",\"name\":\"Principes fondamentaux d'un syst\u00e8me d'authentification ma\u00eetre\/esclave SHA-256 -\",\"isPartOf\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#website\"},\"datePublished\":\"2013-07-16T22:00:00+00:00\",\"dateModified\":\"2022-01-26T15:21:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/white_papers\/principes-fondamentaux-dun-systeme-dauthentification-maitre-esclave-sha-256\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ecinews.fr\/fr\/white_papers\/principes-fondamentaux-dun-systeme-dauthentification-maitre-esclave-sha-256\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/white_papers\/principes-fondamentaux-dun-systeme-dauthentification-maitre-esclave-sha-256\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ecinews.fr\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Principes fondamentaux d&rsquo;un syst\u00e8me d&rsquo;authentification ma\u00eetre\/esclave SHA-256\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#website\",\"url\":\"https:\/\/www.eenewseurope.com\/en\/\",\"name\":\"EENewsEurope\",\"description\":\"Just another WordPress site\",\"publisher\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.eenewseurope.com\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#organization\",\"name\":\"EENewsEurope\",\"url\":\"https:\/\/www.eenewseurope.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg\",\"contentUrl\":\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg\",\"width\":283,\"height\":113,\"caption\":\"EENewsEurope\"},\"image\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>","yoast_head_json":{"title":"Principes fondamentaux d'un syst\u00e8me d'authentification ma\u00eetre...","description":"Depuis plus de 10 ans, l'authentification SHA-1 sert \u00e0 prot\u00e9ger efficacement la propri\u00e9t\u00e9 intellectuelle contre la contrefa\u00e7on et la copie ill\u00e9gale....","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/white_papers\/27394\/","og_locale":"fr_FR","og_type":"article","og_title":"Principes fondamentaux d'un syst\u00e8me d'authentification ma\u00eetre\/esclave SHA-256","og_description":"Depuis plus de 10 ans, l'authentification SHA-1 sert \u00e0 prot\u00e9ger efficacement la propri\u00e9t\u00e9 intellectuelle contre la contrefa\u00e7on et la copie ill\u00e9gale. Alors que la puissance de calcul progresse, les utilisateurs demandent un niveau de la s\u00e9curit\u00e9 encore plus \u00e9lev\u00e9. Aujourd'hui un nouveau groupe d'authentificateurs s\u00e9curis\u00e9s associ\u00e9s \u00e0 un coprocesseur compagnon s\u00e9curis\u00e9, permettent\u00a0 de d\u00e9ployer une authentification SHA-256. Ce nouveau syst\u00e8me fournit une s\u00e9curit\u00e9 physique sup\u00e9rieure, qui permet d'assurer une protection d'IP in\u00e9gal\u00e9e \u00e0 bas co\u00fbt, emp\u00eache le clonage, et permet l'authentification de p\u00e9riph\u00e9rique. Cet article explique l'architecture g\u00e9n\u00e9rale des syst\u00e8mes de s\u00e9curit\u00e9 SHA-256 et introduit la fonctionnalit\u00e9 d'authentification bidirectionnelle que le syst\u00e8me d'authentification utilise.","og_url":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/white_papers\/27394\/","og_site_name":"EENewsEurope","article_modified_time":"2022-01-26T15:21:50+00:00","og_image":[{"width":1046,"height":802,"url":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/import\/default\/files\/import\/eci3827_maxim-applic-.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ecinews.fr\/fr\/white_papers\/principes-fondamentaux-dun-systeme-dauthentification-maitre-esclave-sha-256\/","url":"https:\/\/www.ecinews.fr\/fr\/white_papers\/principes-fondamentaux-dun-systeme-dauthentification-maitre-esclave-sha-256\/","name":"Principes fondamentaux d'un syst\u00e8me d'authentification ma\u00eetre\/esclave SHA-256 -","isPartOf":{"@id":"https:\/\/www.eenewseurope.com\/en\/#website"},"datePublished":"2013-07-16T22:00:00+00:00","dateModified":"2022-01-26T15:21:50+00:00","breadcrumb":{"@id":"https:\/\/www.ecinews.fr\/fr\/white_papers\/principes-fondamentaux-dun-systeme-dauthentification-maitre-esclave-sha-256\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ecinews.fr\/fr\/white_papers\/principes-fondamentaux-dun-systeme-dauthentification-maitre-esclave-sha-256\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ecinews.fr\/fr\/white_papers\/principes-fondamentaux-dun-systeme-dauthentification-maitre-esclave-sha-256\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ecinews.fr\/fr\/"},{"@type":"ListItem","position":2,"name":"Principes fondamentaux d&rsquo;un syst\u00e8me d&rsquo;authentification ma\u00eetre\/esclave SHA-256"}]},{"@type":"WebSite","@id":"https:\/\/www.eenewseurope.com\/en\/#website","url":"https:\/\/www.eenewseurope.com\/en\/","name":"EENewsEurope","description":"Just another WordPress site","publisher":{"@id":"https:\/\/www.eenewseurope.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eenewseurope.com\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.eenewseurope.com\/en\/#organization","name":"EENewsEurope","url":"https:\/\/www.eenewseurope.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg","contentUrl":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg","width":283,"height":113,"caption":"EENewsEurope"},"image":{"@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/white_papers\/27394"}],"collection":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/white_papers"}],"about":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/types\/white_papers"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/media\/27396"}],"wp:attachment":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/media?parent=27394"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/tags?post=27394"},{"taxonomy":"company","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/company?post=27394"},{"taxonomy":"wp_category","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/wp_category?post=27394"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/ppma_author?post=27394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}